top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advanced Informatics for Computing Research : 5th International Conference, ICAICR 2021, Gurugram, India, December 18–19, 2021, Revised Selected Papers / / edited by Ashish Kumar Luhach, Dharm Singh Jat, Kamarul Bin Ghazali Hawari, Xiao-Zhi Gao, Pawan Lingras
Advanced Informatics for Computing Research : 5th International Conference, ICAICR 2021, Gurugram, India, December 18–19, 2021, Revised Selected Papers / / edited by Ashish Kumar Luhach, Dharm Singh Jat, Kamarul Bin Ghazali Hawari, Xiao-Zhi Gao, Pawan Lingras
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (289 pages)
Disciplina 004
Collana Communications in Computer and Information Science
Soggetto topico Artificial intelligence
Computer engineering
Computer networks
Social sciences - Data processing
Education - Data processing
Computer vision
Artificial Intelligence
Computer Engineering and Networks
Computer Application in Social and Behavioral Sciences
Computers and Education
Computer Vision
Informàtica
Investigació
Soggetto genere / forma Congressos
Llibres electrònics
Soggetto non controllato Mathematics
ISBN 3-031-09469-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996478861003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advanced Informatics for Computing Research : 5th International Conference, ICAICR 2021, Gurugram, India, December 18–19, 2021, Revised Selected Papers / / edited by Ashish Kumar Luhach, Dharm Singh Jat, Kamarul Bin Ghazali Hawari, Xiao-Zhi Gao, Pawan Lingras
Advanced Informatics for Computing Research : 5th International Conference, ICAICR 2021, Gurugram, India, December 18–19, 2021, Revised Selected Papers / / edited by Ashish Kumar Luhach, Dharm Singh Jat, Kamarul Bin Ghazali Hawari, Xiao-Zhi Gao, Pawan Lingras
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (289 pages)
Disciplina 004
Collana Communications in Computer and Information Science
Soggetto topico Artificial intelligence
Computer engineering
Computer networks
Social sciences - Data processing
Education - Data processing
Computer vision
Artificial Intelligence
Computer Engineering and Networks
Computer Application in Social and Behavioral Sciences
Computers and Education
Computer Vision
Informàtica
Investigació
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 3-031-09469-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910580172403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced informatics for computing research : 4th international conference, ICAICR 2020, Gurugram, India, December 26-27, 2020, revised selected papers, part II / / Ashish Kumar Luhach [and four others], editors
Advanced informatics for computing research : 4th international conference, ICAICR 2020, Gurugram, India, December 26-27, 2020, revised selected papers, part II / / Ashish Kumar Luhach [and four others], editors
Pubbl/distr/stampa Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (297 pages)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Artificial intelligence
Computer networks
Computer architecture
ISBN 981-16-3653-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- Hardware -- Design and Simulation of a Coaxial Fed Slotted Wide-Band Rectenna for Wireless Power Transmission -- 1 Introduction -- 1.1 Related Work -- 1.2 Contribution -- 1.3 Organisation of the Paper -- 2 Proposed Rectenna Design -- 2.1 Slotted Antenna Design -- 2.2 Greinacher Voltage Doubler Iinspired Rectifier Circuit -- 3 Results and Discussions -- 3.1 Results of Slotted Antenna -- 3.2 Results for Rectifier Circuit -- 4 Conclusion -- 5 Future Work -- References -- Optimised Multi Energy System (OMES) for Electric Vehicle -- 1 Introduction -- 2 Literature Overview -- 3 Proposed Mechanism Using Solar Energy and MESS -- 4 Result Analysis -- 5 Conclusion -- References -- Modeling of Microstrip Patch Antenna Using Artificial Neural Network Algorithms -- 1 Introduction -- 2 Antenna Configuration -- 3 ANN Model of a Patch Antenna -- 4 ANN Algorithms -- 4.1 RBF Model -- 4.2 MLP Model -- 5 Determining the Parameters of Patch Antenna Using ANN -- 6 Modeling the Patch Antenna in CST -- 7 Conclusion -- References -- Smart PDM: A Novel Smart Meter for Design Measurement and Data Collection for Smart Grid -- 1 Introduction -- 2 Smart Meter -- 2.1 Introduction and Architecture -- 2.2 Challenges of Smart Meter -- 3 Smart PDM 1.0 - Smart Power Data Measurement System -- 3.1 System Model -- 3.2 Architecture -- 4 Working Prototype and Results -- 4.1 Step and Algorithm -- 4.2 Working of System -- 5 Results and Discussion -- 5.1 Test Results at the Laboratory -- 5.2 Test Results at a Household -- 5.3 Testing and Calibration -- 5.4 Conclusion and Future Scope -- References -- GSM Based Remote Distribution Transformer Condition Monitoring System -- 1 Introduction -- 2 Literature Review -- 3 Research Design -- 4 Case Study: PNG Power Ltd.
4.1 Distribution Transformer Current Measurement -- 4.2 Distribution Transformer Voltage Measurement -- 5 Hardware Simulation -- 5.1 Hardware Simulation with LCD Display -- 5.2 Hardware Simulation with GSM SIM808 Alert SMS -- 6 Conclusion -- References -- Networks -- Performance Analysis and Classification of Node Capture Attack Models in WSN -- 1 Introduction -- 2 Related Work -- 3 Modeling in Wireless Network -- 3.1 Key Distribution Modelling -- 3.2 Link-Based Modeling -- 3.3 Network-Based Modeling -- 3.4 Adversarial Based Modeling -- 4 Classification of Node Capture Attack Models -- 4.1 Random Attack (RA) -- 4.2 Maximum Key Attack (MKA) -- 4.3 Maximum Link Attack (MLA) -- 4.4 Dominating Node Attack (DNA) -- 4.5 Maximum Traffic Attack (MTA) -- 4.6 Greedy Node Capture Approximation Using Vulnerability Evaluation (GNAVE) -- 4.7 Matrix Based Attack (MA) -- 4.8 Full Graph Attack (FGA) -- 4.9 Opti-Graph Attack (OGA) -- 4.10 Minimum Resource Expenditure Attack (MREA) -- 4.11 Path Covering Attack (PCA) -- 4.12 Generic Algorithm (GA) -- 4.13 Fruit Fly Optimization Algorithm (FFOA) -- 4.14 Finding Robust Assailant Optimization-Particle Swarm Optimization and Genetic Algorithm (FiRAO-PG (GA)) -- 5 Simulations and Experiments -- 5.1 Fraction of Compromised Traffic -- 5.2 Energy Cost -- 6 Conclusion and Future Work -- References -- An Efficient IoT Based Framework for Missed Call Messaging Services for Electricity Consumers -- 1 Introduction -- 2 Review of Literature -- 3 Components of the Model -- 4 Block Diagram of Missed Call Messaging Service -- 5 Algorithm/Working of IoT Based Device -- 6 Advantages -- 7 Results and Discussion -- 8 Conclusion -- 9 Future Work -- References -- A Divide and Conquer Based Data Aggregation Technique for WBANs -- 1 Introduction -- 2 Related Work -- 3 Data Aggregation -- 4 Implementation and Observations.
4.1 Performance Evaluation w.r.t. Number of Packets -- 4.2 Performance Evaluation w.r.t. Energy Consumption -- 4.3 Performance Evaluation w.r.t. Average Delay -- 4.4 Performance Evaluation w.r.t. Packet Delivery Ratio -- 4.5 Performance Evaluation w.r.t. Network Lifetime -- 5 Coclusion and Future Scope -- References -- Open Research Challenges and Blockchain Based Security Solution for 5G Enabled IoT -- 1 Introduction -- 2 Open Challenges in 5G and IoT -- 2.1 IoT Emerging Technologies and Challenges -- 2.2 5G Emerging Technologies and Challenges -- 3 5G Enabled IoT Technologies and Challenges -- 3.1 Network Function Virtualization (NFV) -- 3.2 Heterogeneous Network (HetNet) -- 3.3 Device to Device Communication -- 3.4 Advanced Spectrum and Interference Administration -- 4 Suggested Security Solution -- 4.1 Blockchain Technique -- 4.2 Proposed Solution -- 5 Conclusion -- References -- A Performance Discussion of Web Crawler Using Some Advanced Factors -- 1 Introduction -- 2 Literature Review -- 3 Problem Statement -- 4 Proposed Work -- 5 Results -- 6 Comparison Chart -- 7 Conclusion -- 8 Future Scope -- References -- Internet of Things in Healthcare: A Review -- 1 Introduction -- 2 IoT in Disease Diagnostics -- 3 IoT for Health Monitoring -- 4 IoT in Predictive Medicine -- 5 IoT in Storage of Medicine -- 6 Challenges -- 7 Discussion and Conclusion -- References -- Inter-Vehicular Communication for Intelligent Collision Avoidance Using Machine Learning: An Overview -- 1 Introduction -- 2 Motivation -- 2.1 The Economy -- 2.2 The Lesson -- 2.3 The Problem -- 3 Background -- 4 Conventional System -- 5 Proposed System -- 5.1 Inter-Vehicular Communication (IVC) -- 5.2 Navigation with Indian Constellation (NavIC) -- 5.3 Machine Learning -- 5.4 Sensors -- 6 Functioning Methodology -- 6.1 Phase-I: Training -- 6.2 Phase-II: Actual Implementation.
7 System Workflow -- 8 Performance Measure -- 9 Observations -- 10 Conclusion -- 11 Limitations -- 12 Future Work -- References -- Wireless Sensor Networks Source Location Privacy Preservation Mechanism -- 1 Introduction -- 2 Existing Works -- 3 Problem Definition -- 4 Network Model -- 5 Adversary Model -- 6 PSLP Implementation -- 7 Phantom Nodes Determination -- 8 Fake Sources Determination -- 9 Performance Evaluation -- 10 Conclusions -- References -- A Study on Secure Data Aggregation and Routing for Wireless Sensor Networks -- 1 Introduction -- 2 Routing Strategy and Design Challenges in WSNs -- 3 Data Aggregation Scheme in WSN -- 4 Related Work -- 5 Security Schemes for Aggregation Routing -- 5.1 Key Management Scheme -- 5.2 Certification -- 5.3 Routing Security -- 6 Research Gap -- 7 Conclusion -- References -- Comparative Analysis of Internet of Things (IoT) Security Models -- 1 Introduction -- 2 Related Work -- 3 Overview of the Existing Security Models -- 3.1 The Amazon Web Service Model -- 3.2 Trust Model in IoT-Enabled Vehicular Netwokrs -- 3.3 Autonomous IoT/IıoT Security Model -- 4 Analysis and Discussion -- 5 Future Scope in IoT-Based Security -- 6 Conclusion -- References -- Study of Energy Efficient Routing Protocols for Adhoc-Wireless Sensor Networks -- 1 Introduction -- 2 Classification of RPs -- 2.1 Proactive RPs -- 2.2 Reactive RPs -- 2.3 Hybrid RPs -- 3 Latest Research Works Reported in Literature -- 4 Conclusion -- References -- IoT Based Smart Transport Management System -- 1 Introduction -- 2 Traffic Congestion Control System -- 3 Traffic Density Monitoring Module (TDMM) -- 4 Traffic Message Channel (TMC) -- 5 Traffic Management Module (TMM) -- 6 Working of Traffic Density Monitoring Module -- 7 Case Study: 1 -- 8 Case Study: 2 -- 9 Vehicle to Vehicle Communication Protocol Design -- 10 Conclusion -- References.
Vehicular Ad Hoc Network: Routing Protocols -- 1 Introduction -- 2 Routings Protocols of VANET -- 2.1 Based on Topology -- 2.2 Based on Position -- 2.3 Based on Cluster -- 2.4 Based on Broadcast -- 2.5 Based on Geo-Cast -- 3 Distance Sequance Distance Vector -- 4 Dynamic Source Routing Protocol -- 5 Zone Routing Protocol -- 6 Conclusion -- References -- A Reluctant Checksum Scheme Based on the Inherent Characteristic of Wireless Networks -- 1 Introduction -- 2 Literature Survey -- 2.1 Enhanced Protection Use of the Physical Layer -- 2.2 GloMoSim: A Library for Large-Scale Wireless Network Emulation -- 2.3 Wireless Protection in the Physical Layer via Pre-coding Transmission via Dispersive Channels -- 2.4 Wireless Protection Physical Layer Made the Channel Independent and Fast -- 2.5 In the Face of a Military Interference with ARQ-Based Wireless Communication Networks -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Security and Privacy -- Anomaly Based Detection of Cross Site Scripting Attack in Web Applications Using Gradient Boosting Classifier -- 1 Introduction -- 1.1 XSS Attack -- 1.2 Gradient Boosting Classifier -- 1.3 Intrusion Detection System -- 2 Literature Survey -- 3 Problem Statement -- 4 Description of the Proposed System -- 4.1 Data Analysis -- 4.2 Feature Selection -- 4.3 Prediction -- 5 Implementation -- 5.1 The Dataset -- 5.2 Correlation -- 5.3 Performance Evaluation Metrics -- 6 Result and Conclusion -- 7 Future Enhancements -- References -- Crypto Key Protection Generated from Images and Chaotic Logistic Maps -- 1 Introduction -- 2 Background Survey -- 3 Proposed Approach with Its Implementation -- 3.1 Basic Terminology -- 3.2 Algorithm -- 3.3 Experimental Evaluation -- 4 Conclusion and Future Scope -- References.
An Effıcıent Fault Management in Communication Networks Usıng On Demand Link State Algorıthm.
Record Nr. UNISA-996464411803316
Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advanced informatics for computing research : 4th international conference, ICAICR 2020, Gurugram, India, December 26-27, 2020, revised selected papers, part II / / Ashish Kumar Luhach [and four others], editors
Advanced informatics for computing research : 4th international conference, ICAICR 2020, Gurugram, India, December 26-27, 2020, revised selected papers, part II / / Ashish Kumar Luhach [and four others], editors
Pubbl/distr/stampa Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (297 pages)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Artificial intelligence
Computer networks
Computer architecture
ISBN 981-16-3653-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- Hardware -- Design and Simulation of a Coaxial Fed Slotted Wide-Band Rectenna for Wireless Power Transmission -- 1 Introduction -- 1.1 Related Work -- 1.2 Contribution -- 1.3 Organisation of the Paper -- 2 Proposed Rectenna Design -- 2.1 Slotted Antenna Design -- 2.2 Greinacher Voltage Doubler Iinspired Rectifier Circuit -- 3 Results and Discussions -- 3.1 Results of Slotted Antenna -- 3.2 Results for Rectifier Circuit -- 4 Conclusion -- 5 Future Work -- References -- Optimised Multi Energy System (OMES) for Electric Vehicle -- 1 Introduction -- 2 Literature Overview -- 3 Proposed Mechanism Using Solar Energy and MESS -- 4 Result Analysis -- 5 Conclusion -- References -- Modeling of Microstrip Patch Antenna Using Artificial Neural Network Algorithms -- 1 Introduction -- 2 Antenna Configuration -- 3 ANN Model of a Patch Antenna -- 4 ANN Algorithms -- 4.1 RBF Model -- 4.2 MLP Model -- 5 Determining the Parameters of Patch Antenna Using ANN -- 6 Modeling the Patch Antenna in CST -- 7 Conclusion -- References -- Smart PDM: A Novel Smart Meter for Design Measurement and Data Collection for Smart Grid -- 1 Introduction -- 2 Smart Meter -- 2.1 Introduction and Architecture -- 2.2 Challenges of Smart Meter -- 3 Smart PDM 1.0 - Smart Power Data Measurement System -- 3.1 System Model -- 3.2 Architecture -- 4 Working Prototype and Results -- 4.1 Step and Algorithm -- 4.2 Working of System -- 5 Results and Discussion -- 5.1 Test Results at the Laboratory -- 5.2 Test Results at a Household -- 5.3 Testing and Calibration -- 5.4 Conclusion and Future Scope -- References -- GSM Based Remote Distribution Transformer Condition Monitoring System -- 1 Introduction -- 2 Literature Review -- 3 Research Design -- 4 Case Study: PNG Power Ltd.
4.1 Distribution Transformer Current Measurement -- 4.2 Distribution Transformer Voltage Measurement -- 5 Hardware Simulation -- 5.1 Hardware Simulation with LCD Display -- 5.2 Hardware Simulation with GSM SIM808 Alert SMS -- 6 Conclusion -- References -- Networks -- Performance Analysis and Classification of Node Capture Attack Models in WSN -- 1 Introduction -- 2 Related Work -- 3 Modeling in Wireless Network -- 3.1 Key Distribution Modelling -- 3.2 Link-Based Modeling -- 3.3 Network-Based Modeling -- 3.4 Adversarial Based Modeling -- 4 Classification of Node Capture Attack Models -- 4.1 Random Attack (RA) -- 4.2 Maximum Key Attack (MKA) -- 4.3 Maximum Link Attack (MLA) -- 4.4 Dominating Node Attack (DNA) -- 4.5 Maximum Traffic Attack (MTA) -- 4.6 Greedy Node Capture Approximation Using Vulnerability Evaluation (GNAVE) -- 4.7 Matrix Based Attack (MA) -- 4.8 Full Graph Attack (FGA) -- 4.9 Opti-Graph Attack (OGA) -- 4.10 Minimum Resource Expenditure Attack (MREA) -- 4.11 Path Covering Attack (PCA) -- 4.12 Generic Algorithm (GA) -- 4.13 Fruit Fly Optimization Algorithm (FFOA) -- 4.14 Finding Robust Assailant Optimization-Particle Swarm Optimization and Genetic Algorithm (FiRAO-PG (GA)) -- 5 Simulations and Experiments -- 5.1 Fraction of Compromised Traffic -- 5.2 Energy Cost -- 6 Conclusion and Future Work -- References -- An Efficient IoT Based Framework for Missed Call Messaging Services for Electricity Consumers -- 1 Introduction -- 2 Review of Literature -- 3 Components of the Model -- 4 Block Diagram of Missed Call Messaging Service -- 5 Algorithm/Working of IoT Based Device -- 6 Advantages -- 7 Results and Discussion -- 8 Conclusion -- 9 Future Work -- References -- A Divide and Conquer Based Data Aggregation Technique for WBANs -- 1 Introduction -- 2 Related Work -- 3 Data Aggregation -- 4 Implementation and Observations.
4.1 Performance Evaluation w.r.t. Number of Packets -- 4.2 Performance Evaluation w.r.t. Energy Consumption -- 4.3 Performance Evaluation w.r.t. Average Delay -- 4.4 Performance Evaluation w.r.t. Packet Delivery Ratio -- 4.5 Performance Evaluation w.r.t. Network Lifetime -- 5 Coclusion and Future Scope -- References -- Open Research Challenges and Blockchain Based Security Solution for 5G Enabled IoT -- 1 Introduction -- 2 Open Challenges in 5G and IoT -- 2.1 IoT Emerging Technologies and Challenges -- 2.2 5G Emerging Technologies and Challenges -- 3 5G Enabled IoT Technologies and Challenges -- 3.1 Network Function Virtualization (NFV) -- 3.2 Heterogeneous Network (HetNet) -- 3.3 Device to Device Communication -- 3.4 Advanced Spectrum and Interference Administration -- 4 Suggested Security Solution -- 4.1 Blockchain Technique -- 4.2 Proposed Solution -- 5 Conclusion -- References -- A Performance Discussion of Web Crawler Using Some Advanced Factors -- 1 Introduction -- 2 Literature Review -- 3 Problem Statement -- 4 Proposed Work -- 5 Results -- 6 Comparison Chart -- 7 Conclusion -- 8 Future Scope -- References -- Internet of Things in Healthcare: A Review -- 1 Introduction -- 2 IoT in Disease Diagnostics -- 3 IoT for Health Monitoring -- 4 IoT in Predictive Medicine -- 5 IoT in Storage of Medicine -- 6 Challenges -- 7 Discussion and Conclusion -- References -- Inter-Vehicular Communication for Intelligent Collision Avoidance Using Machine Learning: An Overview -- 1 Introduction -- 2 Motivation -- 2.1 The Economy -- 2.2 The Lesson -- 2.3 The Problem -- 3 Background -- 4 Conventional System -- 5 Proposed System -- 5.1 Inter-Vehicular Communication (IVC) -- 5.2 Navigation with Indian Constellation (NavIC) -- 5.3 Machine Learning -- 5.4 Sensors -- 6 Functioning Methodology -- 6.1 Phase-I: Training -- 6.2 Phase-II: Actual Implementation.
7 System Workflow -- 8 Performance Measure -- 9 Observations -- 10 Conclusion -- 11 Limitations -- 12 Future Work -- References -- Wireless Sensor Networks Source Location Privacy Preservation Mechanism -- 1 Introduction -- 2 Existing Works -- 3 Problem Definition -- 4 Network Model -- 5 Adversary Model -- 6 PSLP Implementation -- 7 Phantom Nodes Determination -- 8 Fake Sources Determination -- 9 Performance Evaluation -- 10 Conclusions -- References -- A Study on Secure Data Aggregation and Routing for Wireless Sensor Networks -- 1 Introduction -- 2 Routing Strategy and Design Challenges in WSNs -- 3 Data Aggregation Scheme in WSN -- 4 Related Work -- 5 Security Schemes for Aggregation Routing -- 5.1 Key Management Scheme -- 5.2 Certification -- 5.3 Routing Security -- 6 Research Gap -- 7 Conclusion -- References -- Comparative Analysis of Internet of Things (IoT) Security Models -- 1 Introduction -- 2 Related Work -- 3 Overview of the Existing Security Models -- 3.1 The Amazon Web Service Model -- 3.2 Trust Model in IoT-Enabled Vehicular Netwokrs -- 3.3 Autonomous IoT/IıoT Security Model -- 4 Analysis and Discussion -- 5 Future Scope in IoT-Based Security -- 6 Conclusion -- References -- Study of Energy Efficient Routing Protocols for Adhoc-Wireless Sensor Networks -- 1 Introduction -- 2 Classification of RPs -- 2.1 Proactive RPs -- 2.2 Reactive RPs -- 2.3 Hybrid RPs -- 3 Latest Research Works Reported in Literature -- 4 Conclusion -- References -- IoT Based Smart Transport Management System -- 1 Introduction -- 2 Traffic Congestion Control System -- 3 Traffic Density Monitoring Module (TDMM) -- 4 Traffic Message Channel (TMC) -- 5 Traffic Management Module (TMM) -- 6 Working of Traffic Density Monitoring Module -- 7 Case Study: 1 -- 8 Case Study: 2 -- 9 Vehicle to Vehicle Communication Protocol Design -- 10 Conclusion -- References.
Vehicular Ad Hoc Network: Routing Protocols -- 1 Introduction -- 2 Routings Protocols of VANET -- 2.1 Based on Topology -- 2.2 Based on Position -- 2.3 Based on Cluster -- 2.4 Based on Broadcast -- 2.5 Based on Geo-Cast -- 3 Distance Sequance Distance Vector -- 4 Dynamic Source Routing Protocol -- 5 Zone Routing Protocol -- 6 Conclusion -- References -- A Reluctant Checksum Scheme Based on the Inherent Characteristic of Wireless Networks -- 1 Introduction -- 2 Literature Survey -- 2.1 Enhanced Protection Use of the Physical Layer -- 2.2 GloMoSim: A Library for Large-Scale Wireless Network Emulation -- 2.3 Wireless Protection in the Physical Layer via Pre-coding Transmission via Dispersive Channels -- 2.4 Wireless Protection Physical Layer Made the Channel Independent and Fast -- 2.5 In the Face of a Military Interference with ARQ-Based Wireless Communication Networks -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Security and Privacy -- Anomaly Based Detection of Cross Site Scripting Attack in Web Applications Using Gradient Boosting Classifier -- 1 Introduction -- 1.1 XSS Attack -- 1.2 Gradient Boosting Classifier -- 1.3 Intrusion Detection System -- 2 Literature Survey -- 3 Problem Statement -- 4 Description of the Proposed System -- 4.1 Data Analysis -- 4.2 Feature Selection -- 4.3 Prediction -- 5 Implementation -- 5.1 The Dataset -- 5.2 Correlation -- 5.3 Performance Evaluation Metrics -- 6 Result and Conclusion -- 7 Future Enhancements -- References -- Crypto Key Protection Generated from Images and Chaotic Logistic Maps -- 1 Introduction -- 2 Background Survey -- 3 Proposed Approach with Its Implementation -- 3.1 Basic Terminology -- 3.2 Algorithm -- 3.3 Experimental Evaluation -- 4 Conclusion and Future Scope -- References.
An Effıcıent Fault Management in Communication Networks Usıng On Demand Link State Algorıthm.
Record Nr. UNINA-9910485587303321
Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Informatics for Computing Research : 4th International Conference, ICAICR 2020, Gurugram, India, December 26–27, 2020, Revised Selected Papers, Part I / / edited by Ashish Kumar Luhach, Dharm Singh Jat, Kamarul Hawari Bin Ghazali, Xiao-Zhi Gao, Pawan Lingras
Advanced Informatics for Computing Research : 4th International Conference, ICAICR 2020, Gurugram, India, December 26–27, 2020, Revised Selected Papers, Part I / / edited by Ashish Kumar Luhach, Dharm Singh Jat, Kamarul Hawari Bin Ghazali, Xiao-Zhi Gao, Pawan Lingras
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (698 pages)
Disciplina 004
Collana Communications in Computer and Information Science
Soggetto topico Artificial intelligence
Computer engineering
Computer networks
Social sciences - Data processing
Education - Data processing
Image processing - Digital techniques
Computer vision
Artificial Intelligence
Computer Engineering and Networks
Computer Application in Social and Behavioral Sciences
Computers and Education
Computer Imaging, Vision, Pattern Recognition and Graphics
Informàtica
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 981-16-3660-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents - Part I -- Contents - Part II -- Computing Methodologies -- Analysis of Developers' Sentiments in Commit Comments -- 1 Introduction -- 2 Related Literature -- 3 Research Methodology -- 3.1 Research Data -- 3.2 Sentiment Analysis -- 4 Results -- 5 Threat to Validity -- 6 Conclusions -- References -- Design of UML Diagrams for Intervention for Autism Children (IAC System) -- 1 Introduction -- 2 Functionalities of the System -- 3 Proposed IAC System -- 3.1 System Architecture -- 3.2 Data Flow Diagram -- 4 UML Diagrams -- 4.1 UML Usecase Diagram -- 4.2 UML Class Diagram -- 4.3 UML Activity Diagram -- 4.4 UML Sequence Diagram -- 4.5 UML Collaboration Diagram -- 4.6 UML State Machine Diagram -- 4.7 UML Component Diagram -- 4.8 UML Deployment Diagram -- 5 Experimental Results -- 6 Conclusion and Future Enhancement -- References -- Data Analysis and Forecasting of COVID-19 Outbreak in India Using ARIMA Model -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Proposed Methodology -- 4 Result Analysıs -- 5 Conclusion -- References -- Analysis Paper on Different Algorithm, Dataset and Devices Used for Fundus Images -- 1 Introduction -- 2 Analysis Color Fundus Images -- 2.1 Image Pre-processing -- 2.2 Dataset -- 2.3 DRISHTI-GS -- 3 Partitioning -- 4 Fundus Photography Sustainability with the Latest Devices in Current Health-Care Also -- 5 Limitations in the Earlier Fundus Camera -- 6 Machine Learning Methods for Vessel Extraction -- 7 Conclusion -- References -- Fuzzy Controller for Indoor Air Quality Control: A Sport Complex Case Study -- 1 Introduction -- 2 Background -- 3 Model -- 4 Fuzzy Controller -- 5 Results -- 6 Conclusion -- References -- Cancer Prediction Using Novel Ranking Algorithms and Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 Research Methodology.
3.1 Ranking Based Algorithms -- 3.2 MAR (Mean Accuracy Ranking) -- 3.3 CDR (Class Differential Ranking) -- 3.4 PCR (Per Class Ranking) -- 4 Experimentation and Results -- 4.1 Dataset -- 4.2 Evaluation Metrics -- 4.3 Applying Base Classifiers -- 4.4 Applying Ranking Based Algorithms -- 4.5 Final Model -- 4.6 Comparison of Results with Previous Work -- 5 Conclusion -- References -- Supervısed Learnıng Algorıthm: A Survey -- 1 Introduction -- 2 Methodologies Analysis in Supervised Learning -- 2.1 Logistic Regression -- 2.2 Support Vector Classifier -- 2.3 Decision Tree -- 2.4 Random Forest Classifiers -- 3 Related Work -- 4 Chart of References -- 5 Conclusıon and Future Scope -- References -- Searching Sub-classes Within Type Ia Supernova Using DBSCAN -- 1 Introduction -- 2 Data Set -- 3 Methodology -- 3.1 Validity of DBSCAN -- 4 Results -- 5 Conclusions -- 6 Scope of Study -- References -- Abnormality Detection Based on ECG Segmentation -- 1 Introduction -- 2 Literature Review -- 3 Proposed Model -- 3.1 Software Requirements -- 3.2 Our Methodology -- 4 Flowchart of the Proposed Model -- 5 Experiments and Results -- 5.1 Observation Table -- 6 Conclusion -- References -- Detection and Classification of Toxic Comments by Using LSTM and Bi-LSTM Approach -- 1 Introduction -- 2 Literature Review -- 3 Algorithms and Techniques Used -- 3.1 Long Short-Term Memory (LSTM) -- 3.2 Bi-directional Long Short-Term Memory (Bi-LSTM) -- 4 Proposed Methodology -- 4.1 Dataset Description -- 4.2 Data Analysis -- 4.3 Data Pre-processing -- 4.4 Data Conversion to Input Matrix -- 4.5 Build LSTM and Bi-LSTM Model -- 5 Experimental Results and Analysis -- 6 Conclusion and Future Scope -- References -- On the Effects of Substitution Matrix Choices for Pairwise Gapped Global Sequence Alignment of DNA Nucleotides -- 1 Background -- 2 Methods -- 3 Results and Discussion.
4 Conclusion and Future Work -- References -- Case Based Reasoning Approaches for Reuse and Adaptation in Community Question Answering System -- 1 Introduction -- 2 Research Perspective -- 2.1 CQA Approach -- 2.2 Case Based Analysis for Reuse of Information -- 2.3 Textual Comparison Systems -- 2.4 Graphical Textual Likeliness Approach -- 2.5 Bayesian System for Query-Responses -- 3 Experimentation and Methodology -- 3.1 Graphical Configuration -- 3.2 Initial Processing -- 3.3 Similarity Methods -- 3.4 Reuse and Adaptation -- 4 Assessment -- 4.1 Characteristics and Threshold Limits -- 4.2 Association with Human Assessment -- 4.3 Recall and Precision -- 5 Discussion -- 6 Conclusions -- References -- Depression Detection During the Covid 19 Pandemic by Machine Learning Techniques -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 4 Result Analysis from Literature Survey -- 5 Limitation -- 6 Conclusion and Future Work -- References -- Mucus Plug Blockage Detection in COVID-19 Patient's Chest X-Ray Using Instance Segmentation -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology and Result Analysis -- 4 Conclusion -- References -- Applying Machine Learning to Detect Depression-Related Texts on Social Networks -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Collection and Analysis -- 3.2 Tools -- 4 Data Exploration -- 5 Experiment Results -- 6 Conclusion and Future Work -- References -- Usability Improvements in E-Governance Applications with Simple and Usable Interface (Design Stage) -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Proposed Tools and Technique -- 3.2 Proposed Data -- 4 Result and Discussion -- 5 Conclusion and Future Scope -- 5.1 Future Scope for Researchers -- 5.2 Future Scope for Public Administrator -- References.
PGF Cyberpolicing to Defuse Fake Government of Telangana (FGoT), Fake Government of India (FGoI) and Cybercriminal Legacy -- 1 Introduction -- 2 What Is Fake Government of India - The First FGIIH? -- 3 PGF's AI Solution Approach to CSFGoT -- 4 Disaster Management of Big Data Crimes -- 4.1 The Corona Menace vis-a-vis the FGoT/FGoI Menace -- 5 Cognitive Visuals of Cyberpolicing R& -- D Chief's PGF Organizational Efforts for Adaptive Academic Management: Google Plus Social Network Account, Kcraiah's Snapshots -- 6 Conclusions -- References -- Energy Consumption Analysis of R-Based Machine Learning Algorithms for Pandemic Predictions -- 1 Introduction -- 2 Related Work -- 3 Energy Analysis - An Extended Version -- 4 COVID-19 and ML Algorithms -- 4.1 RandomForest - A Brief -- 4.2 COVID-19 Predictions -- 4.3 Popular Packages -- 5 Experimental Results -- 5.1 Validation Analysis -- 5.2 Prediction Analysis -- 5.3 Energy Consumption Analysis -- 6 Conclusion -- References -- Performance Analysis of Deep Learning Classification for Agriculture Applications Using Sentinel-2 Data -- 1 Introduction -- 2 Study Area and Satellite Dataset -- 3 Methodology -- 3.1 Preprocessing -- 3.2 Deep Learning Process -- 3.3 Classification -- 4 Experimental Analysis -- 5 Conclusion -- References -- Smart Approach for Identification of Pneumonia Using Real-Time Convolutional Neural Networks -- 1 Introduction -- 2 Literature Review -- 3 System Blueprint -- 3.1 Processing System -- 3.2 Setting up System for Use -- 3.3 Anaconda IDE and Jupyter Notebook -- 3.4 Project Environment -- 3.5 Proposed Model -- 3.6 Modeling -- 3.7 Training -- 4 Experimental Results and Outcomes -- 4.1 Data Enrichment -- 4.2 Performance Measures -- 5 Experimental Results -- 5.1 Results -- 5.2 Accuracy and Loss of Proposed Model -- 6 Conclusion and Future Scopes -- References.
A Comparative Study of Deep Learning Techniques for Emotion Estimation Based on E-Learning Through Cognitive State Analysis -- 1 Introduction -- 1.1 Emotion Identification with Facial Expressions -- 1.2 Facial Expression Analysis in E-Learning Systems -- 1.3 Introduction to Cognitive State Analysis in Education -- 2 Related Work -- 3 Comparison Among Various Methods -- 4 Result Analysis from Literature Review -- 5 Conclusion -- References -- Detection of Epileptic Seizures in Long-Term Human EEG by Improved Linear Discriminant Analysis (ILDA) -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Convolutional Neural Networks -- 4.1 Linear Discriminant Analysis -- 5 Results -- 5.1 Performance Analysis -- 6 Conclusion -- References -- Facial Emotional Recognition Using Legion Kernel Convolutional Neural Networks -- 1 Introduction -- 2 Method -- 2.1 Model Architecture -- 2.2 Dataset Training Flowchart -- 2.3 Output Data Flowchart -- 3 Experiment and Results -- 3.1 Procedure -- 3.2 Results -- 4 Advantages and Disadvantages -- 4.1 Advantages -- 4.2 Disadvantages -- 5 Conclusion -- References -- An Attention Based Automatic Image Description Generation -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Architecture -- 4 Training Process -- 5 Experiments Conduction and Result Analysis -- 5.1 Data set -- 5.2 Visualizations from Our Attention Models -- 5.3 Results Obtained -- 6 Conclusion -- 7 Future Scope -- References -- Providing Safety for Citizens and Tourists in Cities: A System for Detecting Anomalous Sounds -- 1 Introduction -- 2 Materials and Methods -- 2.1 Audio Features in the Time Domain -- 2.2 Zero-Crossing Rate -- 3 Results -- 3.1 Dataset -- 4 Conclusion -- References -- Mobilenet V2-FCD: Fake Currency Note Detection -- 1 Introduction -- 2 Literature Study -- 3 Proposed System -- 3.1 Data Collection -- 3.2 Data Pre-processing.
3.3 Data Augmentation.
Record Nr. UNISA-996464506403316
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advanced Informatics for Computing Research : 4th International Conference, ICAICR 2020, Gurugram, India, December 26–27, 2020, Revised Selected Papers, Part I / / edited by Ashish Kumar Luhach, Dharm Singh Jat, Kamarul Hawari Bin Ghazali, Xiao-Zhi Gao, Pawan Lingras
Advanced Informatics for Computing Research : 4th International Conference, ICAICR 2020, Gurugram, India, December 26–27, 2020, Revised Selected Papers, Part I / / edited by Ashish Kumar Luhach, Dharm Singh Jat, Kamarul Hawari Bin Ghazali, Xiao-Zhi Gao, Pawan Lingras
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (698 pages)
Disciplina 004
Collana Communications in Computer and Information Science
Soggetto topico Artificial intelligence
Computer engineering
Computer networks
Social sciences - Data processing
Education - Data processing
Image processing - Digital techniques
Computer vision
Artificial Intelligence
Computer Engineering and Networks
Computer Application in Social and Behavioral Sciences
Computers and Education
Computer Imaging, Vision, Pattern Recognition and Graphics
Informàtica
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 981-16-3660-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents - Part I -- Contents - Part II -- Computing Methodologies -- Analysis of Developers' Sentiments in Commit Comments -- 1 Introduction -- 2 Related Literature -- 3 Research Methodology -- 3.1 Research Data -- 3.2 Sentiment Analysis -- 4 Results -- 5 Threat to Validity -- 6 Conclusions -- References -- Design of UML Diagrams for Intervention for Autism Children (IAC System) -- 1 Introduction -- 2 Functionalities of the System -- 3 Proposed IAC System -- 3.1 System Architecture -- 3.2 Data Flow Diagram -- 4 UML Diagrams -- 4.1 UML Usecase Diagram -- 4.2 UML Class Diagram -- 4.3 UML Activity Diagram -- 4.4 UML Sequence Diagram -- 4.5 UML Collaboration Diagram -- 4.6 UML State Machine Diagram -- 4.7 UML Component Diagram -- 4.8 UML Deployment Diagram -- 5 Experimental Results -- 6 Conclusion and Future Enhancement -- References -- Data Analysis and Forecasting of COVID-19 Outbreak in India Using ARIMA Model -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Proposed Methodology -- 4 Result Analysıs -- 5 Conclusion -- References -- Analysis Paper on Different Algorithm, Dataset and Devices Used for Fundus Images -- 1 Introduction -- 2 Analysis Color Fundus Images -- 2.1 Image Pre-processing -- 2.2 Dataset -- 2.3 DRISHTI-GS -- 3 Partitioning -- 4 Fundus Photography Sustainability with the Latest Devices in Current Health-Care Also -- 5 Limitations in the Earlier Fundus Camera -- 6 Machine Learning Methods for Vessel Extraction -- 7 Conclusion -- References -- Fuzzy Controller for Indoor Air Quality Control: A Sport Complex Case Study -- 1 Introduction -- 2 Background -- 3 Model -- 4 Fuzzy Controller -- 5 Results -- 6 Conclusion -- References -- Cancer Prediction Using Novel Ranking Algorithms and Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 Research Methodology.
3.1 Ranking Based Algorithms -- 3.2 MAR (Mean Accuracy Ranking) -- 3.3 CDR (Class Differential Ranking) -- 3.4 PCR (Per Class Ranking) -- 4 Experimentation and Results -- 4.1 Dataset -- 4.2 Evaluation Metrics -- 4.3 Applying Base Classifiers -- 4.4 Applying Ranking Based Algorithms -- 4.5 Final Model -- 4.6 Comparison of Results with Previous Work -- 5 Conclusion -- References -- Supervısed Learnıng Algorıthm: A Survey -- 1 Introduction -- 2 Methodologies Analysis in Supervised Learning -- 2.1 Logistic Regression -- 2.2 Support Vector Classifier -- 2.3 Decision Tree -- 2.4 Random Forest Classifiers -- 3 Related Work -- 4 Chart of References -- 5 Conclusıon and Future Scope -- References -- Searching Sub-classes Within Type Ia Supernova Using DBSCAN -- 1 Introduction -- 2 Data Set -- 3 Methodology -- 3.1 Validity of DBSCAN -- 4 Results -- 5 Conclusions -- 6 Scope of Study -- References -- Abnormality Detection Based on ECG Segmentation -- 1 Introduction -- 2 Literature Review -- 3 Proposed Model -- 3.1 Software Requirements -- 3.2 Our Methodology -- 4 Flowchart of the Proposed Model -- 5 Experiments and Results -- 5.1 Observation Table -- 6 Conclusion -- References -- Detection and Classification of Toxic Comments by Using LSTM and Bi-LSTM Approach -- 1 Introduction -- 2 Literature Review -- 3 Algorithms and Techniques Used -- 3.1 Long Short-Term Memory (LSTM) -- 3.2 Bi-directional Long Short-Term Memory (Bi-LSTM) -- 4 Proposed Methodology -- 4.1 Dataset Description -- 4.2 Data Analysis -- 4.3 Data Pre-processing -- 4.4 Data Conversion to Input Matrix -- 4.5 Build LSTM and Bi-LSTM Model -- 5 Experimental Results and Analysis -- 6 Conclusion and Future Scope -- References -- On the Effects of Substitution Matrix Choices for Pairwise Gapped Global Sequence Alignment of DNA Nucleotides -- 1 Background -- 2 Methods -- 3 Results and Discussion.
4 Conclusion and Future Work -- References -- Case Based Reasoning Approaches for Reuse and Adaptation in Community Question Answering System -- 1 Introduction -- 2 Research Perspective -- 2.1 CQA Approach -- 2.2 Case Based Analysis for Reuse of Information -- 2.3 Textual Comparison Systems -- 2.4 Graphical Textual Likeliness Approach -- 2.5 Bayesian System for Query-Responses -- 3 Experimentation and Methodology -- 3.1 Graphical Configuration -- 3.2 Initial Processing -- 3.3 Similarity Methods -- 3.4 Reuse and Adaptation -- 4 Assessment -- 4.1 Characteristics and Threshold Limits -- 4.2 Association with Human Assessment -- 4.3 Recall and Precision -- 5 Discussion -- 6 Conclusions -- References -- Depression Detection During the Covid 19 Pandemic by Machine Learning Techniques -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 4 Result Analysis from Literature Survey -- 5 Limitation -- 6 Conclusion and Future Work -- References -- Mucus Plug Blockage Detection in COVID-19 Patient's Chest X-Ray Using Instance Segmentation -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology and Result Analysis -- 4 Conclusion -- References -- Applying Machine Learning to Detect Depression-Related Texts on Social Networks -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Collection and Analysis -- 3.2 Tools -- 4 Data Exploration -- 5 Experiment Results -- 6 Conclusion and Future Work -- References -- Usability Improvements in E-Governance Applications with Simple and Usable Interface (Design Stage) -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Proposed Tools and Technique -- 3.2 Proposed Data -- 4 Result and Discussion -- 5 Conclusion and Future Scope -- 5.1 Future Scope for Researchers -- 5.2 Future Scope for Public Administrator -- References.
PGF Cyberpolicing to Defuse Fake Government of Telangana (FGoT), Fake Government of India (FGoI) and Cybercriminal Legacy -- 1 Introduction -- 2 What Is Fake Government of India - The First FGIIH? -- 3 PGF's AI Solution Approach to CSFGoT -- 4 Disaster Management of Big Data Crimes -- 4.1 The Corona Menace vis-a-vis the FGoT/FGoI Menace -- 5 Cognitive Visuals of Cyberpolicing R& -- D Chief's PGF Organizational Efforts for Adaptive Academic Management: Google Plus Social Network Account, Kcraiah's Snapshots -- 6 Conclusions -- References -- Energy Consumption Analysis of R-Based Machine Learning Algorithms for Pandemic Predictions -- 1 Introduction -- 2 Related Work -- 3 Energy Analysis - An Extended Version -- 4 COVID-19 and ML Algorithms -- 4.1 RandomForest - A Brief -- 4.2 COVID-19 Predictions -- 4.3 Popular Packages -- 5 Experimental Results -- 5.1 Validation Analysis -- 5.2 Prediction Analysis -- 5.3 Energy Consumption Analysis -- 6 Conclusion -- References -- Performance Analysis of Deep Learning Classification for Agriculture Applications Using Sentinel-2 Data -- 1 Introduction -- 2 Study Area and Satellite Dataset -- 3 Methodology -- 3.1 Preprocessing -- 3.2 Deep Learning Process -- 3.3 Classification -- 4 Experimental Analysis -- 5 Conclusion -- References -- Smart Approach for Identification of Pneumonia Using Real-Time Convolutional Neural Networks -- 1 Introduction -- 2 Literature Review -- 3 System Blueprint -- 3.1 Processing System -- 3.2 Setting up System for Use -- 3.3 Anaconda IDE and Jupyter Notebook -- 3.4 Project Environment -- 3.5 Proposed Model -- 3.6 Modeling -- 3.7 Training -- 4 Experimental Results and Outcomes -- 4.1 Data Enrichment -- 4.2 Performance Measures -- 5 Experimental Results -- 5.1 Results -- 5.2 Accuracy and Loss of Proposed Model -- 6 Conclusion and Future Scopes -- References.
A Comparative Study of Deep Learning Techniques for Emotion Estimation Based on E-Learning Through Cognitive State Analysis -- 1 Introduction -- 1.1 Emotion Identification with Facial Expressions -- 1.2 Facial Expression Analysis in E-Learning Systems -- 1.3 Introduction to Cognitive State Analysis in Education -- 2 Related Work -- 3 Comparison Among Various Methods -- 4 Result Analysis from Literature Review -- 5 Conclusion -- References -- Detection of Epileptic Seizures in Long-Term Human EEG by Improved Linear Discriminant Analysis (ILDA) -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Convolutional Neural Networks -- 4.1 Linear Discriminant Analysis -- 5 Results -- 5.1 Performance Analysis -- 6 Conclusion -- References -- Facial Emotional Recognition Using Legion Kernel Convolutional Neural Networks -- 1 Introduction -- 2 Method -- 2.1 Model Architecture -- 2.2 Dataset Training Flowchart -- 2.3 Output Data Flowchart -- 3 Experiment and Results -- 3.1 Procedure -- 3.2 Results -- 4 Advantages and Disadvantages -- 4.1 Advantages -- 4.2 Disadvantages -- 5 Conclusion -- References -- An Attention Based Automatic Image Description Generation -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Architecture -- 4 Training Process -- 5 Experiments Conduction and Result Analysis -- 5.1 Data set -- 5.2 Visualizations from Our Attention Models -- 5.3 Results Obtained -- 6 Conclusion -- 7 Future Scope -- References -- Providing Safety for Citizens and Tourists in Cities: A System for Detecting Anomalous Sounds -- 1 Introduction -- 2 Materials and Methods -- 2.1 Audio Features in the Time Domain -- 2.2 Zero-Crossing Rate -- 3 Results -- 3.1 Dataset -- 4 Conclusion -- References -- Mobilenet V2-FCD: Fake Currency Note Detection -- 1 Introduction -- 2 Literature Study -- 3 Proposed System -- 3.1 Data Collection -- 3.2 Data Pre-processing.
3.3 Data Augmentation.
Record Nr. UNINA-9910485587203321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Informatics for Computing Research : Second International Conference, ICAICR 2018, Shimla, India, July 14–15, 2018, Revised Selected Papers, Part II / / edited by Ashish Kumar Luhach, Dharm Singh, Pao-Ann Hsiung, Kamarul Bin Ghazali Hawari, Pawan Lingras, Pradeep Kumar Singh
Advanced Informatics for Computing Research : Second International Conference, ICAICR 2018, Shimla, India, July 14–15, 2018, Revised Selected Papers, Part II / / edited by Ashish Kumar Luhach, Dharm Singh, Pao-Ann Hsiung, Kamarul Bin Ghazali Hawari, Pawan Lingras, Pradeep Kumar Singh
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XXII, 604 p. 330 illus., 209 illus. in color.)
Disciplina 004
Collana Communications in Computer and Information Science
Soggetto topico Artificial intelligence
Computers
Artificial Intelligence
Information Systems and Communication Service
ISBN 981-13-3143-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Computing methodologies -- Hardware -- Information systems -- Networks -- Security and privacy -- Computing methodologies. .
Record Nr. UNINA-9910350238403321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Informatics for Computing Research : Third International Conference, ICAICR 2019, Shimla, India, June 15–16, 2019, Revised Selected Papers, Part I / / edited by Ashish Kumar Luhach, Dharm Singh Jat, Kamarul Bin Ghazali Hawari, Xiao-Zhi Gao, Pawan Lingras
Advanced Informatics for Computing Research : Third International Conference, ICAICR 2019, Shimla, India, June 15–16, 2019, Revised Selected Papers, Part I / / edited by Ashish Kumar Luhach, Dharm Singh Jat, Kamarul Bin Ghazali Hawari, Xiao-Zhi Gao, Pawan Lingras
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (492 pages) : illustrations (some color)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Artificial intelligence
Computer vision
Data protection
Application software
Algorithms
Computers - Law and legislation
Information technology - Law and legislation
Artificial Intelligence
Computer Vision
Data and Information Security
Computer and Information Systems Applications
Legal Aspects of Computing
ISBN 981-15-0108-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910350216803321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Informatics for Computing Research : Third International Conference, ICAICR 2019, Shimla, India, June 15–16, 2019, Revised Selected Papers, Part II / / edited by Ashish Kumar Luhach, Dharm Singh Jat, Kamarul Bin Ghazali Hawari, Xiao-Zhi Gao, Pawan Lingras
Advanced Informatics for Computing Research : Third International Conference, ICAICR 2019, Shimla, India, June 15–16, 2019, Revised Selected Papers, Part II / / edited by Ashish Kumar Luhach, Dharm Singh Jat, Kamarul Bin Ghazali Hawari, Xiao-Zhi Gao, Pawan Lingras
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (xvi, 409 pages) : illustrations
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Artificial intelligence
Computer networks
Data protection
Cryptography
Data encryption (Computer science)
Computers
Electronic digital computers - Evaluation
Artificial Intelligence
Computer Communication Networks
Data and Information Security
Cryptology
Computing Milieux
System Performance and Evaluation
ISBN 981-15-0111-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hardware -- Information Systems -- Networks -- Software and Its Engineering. .
Record Nr. UNINA-9910350216203321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Informatics for Computing Research : Second International Conference, ICAICR 2018, Shimla, India, July 14–15, 2018, Revised Selected Papers, Part I / / edited by Ashish Kumar Luhach, Dharm Singh, Pao-Ann Hsiung, Kamarul Bin Ghazali Hawari, Pawan Lingras, Pradeep Kumar Singh
Advanced Informatics for Computing Research : Second International Conference, ICAICR 2018, Shimla, India, July 14–15, 2018, Revised Selected Papers, Part I / / edited by Ashish Kumar Luhach, Dharm Singh, Pao-Ann Hsiung, Kamarul Bin Ghazali Hawari, Pawan Lingras, Pradeep Kumar Singh
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XXI, 830 p. 495 illus., 313 illus. in color.)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Artificial intelligence
Computers
Artificial Intelligence
Information Systems and Communication Service
ISBN 981-13-3140-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Computing methodologies -- Hardware -- Information systems -- Networks -- Security and privacy -- Computing methodologies. .
Record Nr. UNINA-9910350238203321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui